INT-firewalld konfiguration
From Datateknik
(Difference between revisions)
(→Lägg till PING och TRACERT) |
|||
Line 43: | Line 43: | ||
Resultat | Resultat | ||
− | + | '''firewall-cmd --list-all-zones | grep -A 14 active''' | |
− | + | ||
kompisar (active) | kompisar (active) | ||
target: default | target: default | ||
− | icmp-block-inversion: | + | icmp-block-inversion: no |
interfaces: | interfaces: | ||
sources: 193.10.128.0/17 2001:1:2::0/64 | sources: 193.10.128.0/17 2001:1:2::0/64 | ||
Line 56: | Line 56: | ||
forward-ports: | forward-ports: | ||
sourceports: | sourceports: | ||
− | icmp-blocks: | + | icmp-blocks: |
rich rules: | rich rules: | ||
− | + | ||
public (active) | public (active) | ||
target: default | target: default | ||
Line 64: | Line 64: | ||
interfaces: ens160 | interfaces: ens160 | ||
sources: | sources: | ||
− | services: | + | services: dns http |
− | ports: | + | ports: 8080 |
protocols: | protocols: | ||
masquerade: no | masquerade: no | ||
forward-ports: | forward-ports: | ||
sourceports: | sourceports: | ||
− | icmp-blocks: | + | icmp-blocks: destination-unreachable echo-reply echo-request |
rich rules: | rich rules: | ||
Revision as of 15:53, 19 January 2018
Nedanstående fungerar ej!
Contents |
Skapa nya zoner
When adding a zone, you must add it to the permanent firewall configuration. You can then reload to bring the configuration into your running session. For instance, we could create the two zones we discussed above by typing:
firewall-cmd --permanent --new-zone=kompisar firewall-cmd --permanent --new-zone=allihopa firewall-cmd --permanent --zone=drop --change-interface=ens160 firewall-cmd --reload firewall-cmd --permanent --get-zones firewall-cmd --permanent --list-all-zones | grep -A 14 active
Lägg in vilka nät
firewall-cmd --permanent --zone=kompisar --add-source="193.10.128.0/17" firewall-cmd --permanent --zone=kompisar --add-source="212.25.132.0/23" firewall-cmd --permanent --zone=kompisar --add-source="2001:0DB8::/32" firewall-cmd --reload firewall-cmd --permanent --list-all-zones | grep -A 14 active
- Nytt kommando ?? firewallctl zone "home" --permanent add source "2001:0DB8::/32"
Lägg till tjänster
sudo firewall-cmd --zone=kompisar --add-service=ssh sudo firewall-cmd --zone=allihopa --add-service=http sudo firewall-cmd --zone=allihopa --add-service=https firewall-cmd --runtime-to-permanent firewall-cmd --reload firewall-cmd --zone=kompisar --list-all firewall-cmd --zone=allihopa --list-all
Lägg till PING och TRACERT
- Ändra icmp-block-inversion till YES
- Öppna för echo-request echo-reply och destination-unreachable ENDAST
firewall-cmd --get-icmptypes firewall-cmd --zone=kompisar --add-icmp-block-inversion firewall-cmd --zone=kompisar --add-icmp-block=echo-request firewall-cmd --zone=kompisar --add-icmp-block=echo-reply firewall-cmd --zone=kompisar --add-icmp-block=destination-unreachable firewall-cmd --runtime-to-permanent
Resultat
firewall-cmd --list-all-zones | grep -A 14 active kompisar (active) target: default icmp-block-inversion: no interfaces: sources: 193.10.128.0/17 2001:1:2::0/64 services: ssh ports: protocols: masquerade: no forward-ports: sourceports: icmp-blocks: rich rules: public (active) target: default icmp-block-inversion: no interfaces: ens160 sources: services: dns http ports: 8080 protocols: masquerade: no forward-ports: sourceports: icmp-blocks: destination-unreachable echo-reply echo-request rich rules:
KONTROLLERA RESULTAT
- Kontrollera att att en port (22) inte är definierad samtidigt som en service (ssh)
Det skall bara finnas ett "hål" i brandväggen per tjänst, inte två! - iptables -v -L
- ip6tables -v -L
Överkurs
firewall-cmd --direct --get-all-rules ipv4 filter INPUT 0 -m state --state NEW -j LOG '--log-prefix=RobLog '